Results 141 to 150 of about 24,382 (331)
Trabecular bone ontogeny of the human talus
Abstract Studies of trabecular ontogeny may provide insight into the factors that drive healthy bone development. There is a growing understanding of how the juvenile skeleton responds to these influences; however, gaps in our knowledge remain. This study aims to identify ontogenetic trabecular patterns and regional changes during development within ...
Rebecca A. G. Reid +2 more
wiley +1 more source
Dynamics Data Encryption Based on Chaotic Functions and Elliptic Curves: Application to Text Data
Background: Given the vast amount of data generated daily on the Internet, numerous cryptosystems have been developed to ensure data confidentiality using symmetric, asymmetric, or hybrid encryption techniques. However, many of these systems suffer from
Joel Kinganga +2 more
doaj +1 more source
Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan +2 more
core
An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP [PDF]
Alaauldin Ibrahim, Gökhan Dalkılıç
openalex +1 more source
Abstract The study of morphological evolution is fundamentally tied to ontogeny, yet studies of these heterochronic processes in the fossil record are rare. Fossils belonging to an ontogenetic series are difficult to assign to an ontogenetic stage due to inconsistent proxies for skeletal ages, challenging to taxonomically assign due to morphological ...
Erika R. Goldsmith, Michelle R. Stocker
wiley +1 more source
Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack.
Rares Ifrim, Decebal Popescu
doaj +1 more source
PMNS Arithmetic for Elliptic Curve Cryptography
We show that using the polynomial modular number system (PMNS) can be relevant for real-world cryptographic applications even in terms of performance. More specifically, we consider elliptic curves for cryptography when pseudo-Mersenne primes cannot be used to define the base field (e.g.
Fangan Yssouf Dosso +3 more
openaire +1 more source
3D anatomical atlas of the heads of male and female adult Chamaeleo calyptratus
The veiled chameleon is a model organism in reptile development research. Utilizing contrast‐enhanced microCT and deep learning segmentation models, we have generated the first digital atlases of the skull, nervous system, cranial muscles and hyolingual muscles.
Alice Leavey +3 more
wiley +1 more source

